This resource is no longer available

Humidification Strategies for Data Centers and Network Rooms

The control of humidity in Information Technology environments is essential to achieving high availability. This paper explains how humidity affects equipment and why humidity control is required. Quantitative design guidelines for existing and new computing installations are discussed. Alternative methods to achieve desired humidity are described and contrasted. The difficult issue of how and where humidity should be measured is explained. The hidden costs associated with over-humidification are described.

Author

Tony Evans
Engineer,
APC
Tony Evans is an engineer with APC in West Kingston, RI. He has 14 years of experience in power and cooling system design and is a member of ASHRAE Technical Committee 9.9 (Mission Critical Facilities, Technology Spaces, & Electronic Equipment).

Vendor:

Schneider Electric

Posted:

10 Jul 2009

Published:

01 Feb 2005

Format:

PDF

Length:

14 Page(s)

Type:

White Paper

Language:

English

This resource is no longer available.

More from Related TechTarget Sites

Microsoft's Windows 10 Enterprise makes Windows 8 seem like a distant memory. But should CIOs wait or take the bait? Also in Searchlight, Google uses sensors to fight pollution; Intel's new memory chip breakthrough.

Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's pioneers. He offers 10 steps CIOs must take now to prepare for the AI technology era ahead.

How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.

Major IT companies like Black Hat and Google spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software, and those protests have caused the U.S. Dept. of Commerce to commit to drafting new rules.

News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.